- Katılım
- 1 Temmuz 2016
- Mesajlar
- 1.579
- Çözümler
- 4
Daha fazla
- Cinsiyet
- Diğer
- Meslek
- Öğrenci
Merhabalar. Oyun oynarken, bu hatayı almaktayım. Bügün 3. defa aldım aynı hatayı. Ekran kartı sürücülerini kaldırıp AMD 20.22 WHQL sürücüsünü yükledim, oyuna girdikten aşağı yukarı 8 dakika geçtikten sonra tekrar bu hatayı aldım. Artık, sürücü kaynaklı olduğunu hiç sanmıyorum.
Mavi Ekran Sonucu:
WinDbg kullanılarak, alınmıştır.
Mavi ekrana "win32kbase.sys" adlı bir dosya sebebiyet vermiş olarak gözüküyor, fakat bu dosyanın ne olduğunu bilmiyorum.
Büyük ihtimalle, bu konumada geri dönüş yapılmayacak ama belki yardımcı olabilecek arkadaşlar olabilir.
@Recep Baltaş @MayCrasH Yardımcı olabilirseniz, çok mutlu olurum.
Şimdiden teşekkürler ve iyi günler diliyorum.
Mavi Ekran Sonucu:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffebb8e622c63c, Address of the instruction which caused the bugcheck
Arg3: fffff609391481c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-FHCJ8F5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffebb8e622c63c
BUGCHECK_P3: fffff609391481c0
BUGCHECK_P4: 0
CONTEXT: fffff609391481c0 -- (.cxr 0xfffff609391481c0)
rax=ffffebd2406f6e58 rbx=ffffebd2459059f0 rcx=ffffebd2406f6e30
rdx=ffffebd2406f6e30 rsi=0000000000000000 rdi=0000000000000000
rip=ffffebb8e622c63c rsp=fffff60939148bb0 rbp=fffff60939148cc0
r8=ffffebd2406f6e30 r9=000000fb2e1ffa40 r10=ffffebb8e622ed60
r11=0000000000000000 r12=0000000000000000 r13=0000000000000008
r14=000000fb2e1ff9a8 r15=ffffebd2407ff2d0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32kbase!NtDCompositionGetBatchId+0x11c:
ffffebb8`e622c63c 488b7c2430 mov rdi,qword ptr [rsp+30h] ss:0018:fffff609`39148be0=0000000000000000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
fffff609`39148bb0 fffff802`583d3c15 : ffff8c8a`00000008 00000217`00000002 000000fb`2e1ff9a8 00000000`00000000 : win32kbase!NtDCompositionGetBatchId+0x11c
fffff609`39148c40 00007ffa`4b343624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fb`2e1ff908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4b343624
SYMBOL_NAME: win32kbase!NtDCompositionGetBatchId+11c
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xfffff609391481c0 ; kb
BUCKET_ID_FUNC_OFFSET: 11c
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!NtDCompositionGetBatchId
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {accae095-d0f4-9e87-7102-3d8620b3fa28}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffebb8e622c63c, Address of the instruction which caused the bugcheck
Arg3: fffff609391481c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-FHCJ8F5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffebb8e622c63c
BUGCHECK_P3: fffff609391481c0
BUGCHECK_P4: 0
CONTEXT: fffff609391481c0 -- (.cxr 0xfffff609391481c0)
rax=ffffebd2406f6e58 rbx=ffffebd2459059f0 rcx=ffffebd2406f6e30
rdx=ffffebd2406f6e30 rsi=0000000000000000 rdi=0000000000000000
rip=ffffebb8e622c63c rsp=fffff60939148bb0 rbp=fffff60939148cc0
r8=ffffebd2406f6e30 r9=000000fb2e1ffa40 r10=ffffebb8e622ed60
r11=0000000000000000 r12=0000000000000000 r13=0000000000000008
r14=000000fb2e1ff9a8 r15=ffffebd2407ff2d0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32kbase!NtDCompositionGetBatchId+0x11c:
ffffebb8`e622c63c 488b7c2430 mov rdi,qword ptr [rsp+30h] ss:0018:fffff609`39148be0=0000000000000000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
fffff609`39148bb0 fffff802`583d3c15 : ffff8c8a`00000008 00000217`00000002 000000fb`2e1ff9a8 00000000`00000000 : win32kbase!NtDCompositionGetBatchId+0x11c
fffff609`39148c40 00007ffa`4b343624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fb`2e1ff908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4b343624
SYMBOL_NAME: win32kbase!NtDCompositionGetBatchId+11c
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xfffff609391481c0 ; kb
BUCKET_ID_FUNC_OFFSET: 11c
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!NtDCompositionGetBatchId
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {accae095-d0f4-9e87-7102-3d8620b3fa28}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffebb8e622c63c, Address of the instruction which caused the bugcheck
Arg3: fffff609391481c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-FHCJ8F5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffebb8e622c63c
BUGCHECK_P3: fffff609391481c0
BUGCHECK_P4: 0
CONTEXT: fffff609391481c0 -- (.cxr 0xfffff609391481c0)
rax=ffffebd2406f6e58 rbx=ffffebd2459059f0 rcx=ffffebd2406f6e30
rdx=ffffebd2406f6e30 rsi=0000000000000000 rdi=0000000000000000
rip=ffffebb8e622c63c rsp=fffff60939148bb0 rbp=fffff60939148cc0
r8=ffffebd2406f6e30 r9=000000fb2e1ffa40 r10=ffffebb8e622ed60
r11=0000000000000000 r12=0000000000000000 r13=0000000000000008
r14=000000fb2e1ff9a8 r15=ffffebd2407ff2d0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32kbase!NtDCompositionGetBatchId+0x11c:
ffffebb8`e622c63c 488b7c2430 mov rdi,qword ptr [rsp+30h] ss:0018:fffff609`39148be0=0000000000000000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
fffff609`39148bb0 fffff802`583d3c15 : ffff8c8a`00000008 00000217`00000002 000000fb`2e1ff9a8 00000000`00000000 : win32kbase!NtDCompositionGetBatchId+0x11c
fffff609`39148c40 00007ffa`4b343624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fb`2e1ff908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4b343624
SYMBOL_NAME: win32kbase!NtDCompositionGetBatchId+11c
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xfffff609391481c0 ; kb
BUCKET_ID_FUNC_OFFSET: 11c
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!NtDCompositionGetBatchId
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {accae095-d0f4-9e87-7102-3d8620b3fa28}
Followup: MachineOwner
---------
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffebb8e622c63c, Address of the instruction which caused the bugcheck
Arg3: fffff609391481c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-FHCJ8F5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffebb8e622c63c
BUGCHECK_P3: fffff609391481c0
BUGCHECK_P4: 0
CONTEXT: fffff609391481c0 -- (.cxr 0xfffff609391481c0)
rax=ffffebd2406f6e58 rbx=ffffebd2459059f0 rcx=ffffebd2406f6e30
rdx=ffffebd2406f6e30 rsi=0000000000000000 rdi=0000000000000000
rip=ffffebb8e622c63c rsp=fffff60939148bb0 rbp=fffff60939148cc0
r8=ffffebd2406f6e30 r9=000000fb2e1ffa40 r10=ffffebb8e622ed60
r11=0000000000000000 r12=0000000000000000 r13=0000000000000008
r14=000000fb2e1ff9a8 r15=ffffebd2407ff2d0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32kbase!NtDCompositionGetBatchId+0x11c:
ffffebb8`e622c63c 488b7c2430 mov rdi,qword ptr [rsp+30h] ss:0018:fffff609`39148be0=0000000000000000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
fffff609`39148bb0 fffff802`583d3c15 : ffff8c8a`00000008 00000217`00000002 000000fb`2e1ff9a8 00000000`00000000 : win32kbase!NtDCompositionGetBatchId+0x11c
fffff609`39148c40 00007ffa`4b343624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fb`2e1ff908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4b343624
SYMBOL_NAME: win32kbase!NtDCompositionGetBatchId+11c
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xfffff609391481c0 ; kb
BUCKET_ID_FUNC_OFFSET: 11c
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!NtDCompositionGetBatchId
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {accae095-d0f4-9e87-7102-3d8620b3fa28}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffebb8e622c63c, Address of the instruction which caused the bugcheck
Arg3: fffff609391481c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-FHCJ8F5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffebb8e622c63c
BUGCHECK_P3: fffff609391481c0
BUGCHECK_P4: 0
CONTEXT: fffff609391481c0 -- (.cxr 0xfffff609391481c0)
rax=ffffebd2406f6e58 rbx=ffffebd2459059f0 rcx=ffffebd2406f6e30
rdx=ffffebd2406f6e30 rsi=0000000000000000 rdi=0000000000000000
rip=ffffebb8e622c63c rsp=fffff60939148bb0 rbp=fffff60939148cc0
r8=ffffebd2406f6e30 r9=000000fb2e1ffa40 r10=ffffebb8e622ed60
r11=0000000000000000 r12=0000000000000000 r13=0000000000000008
r14=000000fb2e1ff9a8 r15=ffffebd2407ff2d0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32kbase!NtDCompositionGetBatchId+0x11c:
ffffebb8`e622c63c 488b7c2430 mov rdi,qword ptr [rsp+30h] ss:0018:fffff609`39148be0=0000000000000000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
fffff609`39148bb0 fffff802`583d3c15 : ffff8c8a`00000008 00000217`00000002 000000fb`2e1ff9a8 00000000`00000000 : win32kbase!NtDCompositionGetBatchId+0x11c
fffff609`39148c40 00007ffa`4b343624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fb`2e1ff908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4b343624
SYMBOL_NAME: win32kbase!NtDCompositionGetBatchId+11c
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xfffff609391481c0 ; kb
BUCKET_ID_FUNC_OFFSET: 11c
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!NtDCompositionGetBatchId
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {accae095-d0f4-9e87-7102-3d8620b3fa28}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffebb8e622c63c, Address of the instruction which caused the bugcheck
Arg3: fffff609391481c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-FHCJ8F5
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffebb8e622c63c
BUGCHECK_P3: fffff609391481c0
BUGCHECK_P4: 0
CONTEXT: fffff609391481c0 -- (.cxr 0xfffff609391481c0)
rax=ffffebd2406f6e58 rbx=ffffebd2459059f0 rcx=ffffebd2406f6e30
rdx=ffffebd2406f6e30 rsi=0000000000000000 rdi=0000000000000000
rip=ffffebb8e622c63c rsp=fffff60939148bb0 rbp=fffff60939148cc0
r8=ffffebd2406f6e30 r9=000000fb2e1ffa40 r10=ffffebb8e622ed60
r11=0000000000000000 r12=0000000000000000 r13=0000000000000008
r14=000000fb2e1ff9a8 r15=ffffebd2407ff2d0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32kbase!NtDCompositionGetBatchId+0x11c:
ffffebb8`e622c63c 488b7c2430 mov rdi,qword ptr [rsp+30h] ss:0018:fffff609`39148be0=0000000000000000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
fffff609`39148bb0 fffff802`583d3c15 : ffff8c8a`00000008 00000217`00000002 000000fb`2e1ff9a8 00000000`00000000 : win32kbase!NtDCompositionGetBatchId+0x11c
fffff609`39148c40 00007ffa`4b343624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fb`2e1ff908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`4b343624
SYMBOL_NAME: win32kbase!NtDCompositionGetBatchId+11c
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xfffff609391481c0 ; kb
BUCKET_ID_FUNC_OFFSET: 11c
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!NtDCompositionGetBatchId
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {accae095-d0f4-9e87-7102-3d8620b3fa28}
Followup: MachineOwner
---------
Mavi ekrana "win32kbase.sys" adlı bir dosya sebebiyet vermiş olarak gözüküyor, fakat bu dosyanın ne olduğunu bilmiyorum.
Büyük ihtimalle, bu konumada geri dönüş yapılmayacak ama belki yardımcı olabilecek arkadaşlar olabilir.
@Recep Baltaş @MayCrasH Yardımcı olabilirseniz, çok mutlu olurum.
Şimdiden teşekkürler ve iyi günler diliyorum.